IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 270 Matches Previous Page  |  Next Page
Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to building their own in-house SIEM. The main business reasons that organizations acquire a SIEM are to easily detect threats and to be able to meet compliance reporting mandates.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals continued on their rampage in 2018 hacking into name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down in 2019. In this webcast, Brian NeSmith walks through the top cybersecurity predictions for 2019 and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOC is no longer an option, but a necessity for all businesses. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Targeting the Hidden Attack Surface of Automation
sponsored by Radware
VIDEO: Automation is changing the world. Tune into this webcast to learn why we should change the way we think about security as AI becomes more integrated in everything around us.
Posted: 07 Nov 2018 | Premiered: 31 Aug 2017

Radware

Cybersecurity Pushed to the Limit
sponsored by Radware
VIDEO: Tune into this webinar for look ahead – predictions and what to prepare for in the future of cyberattacks and security threats.
Posted: 06 Nov 2018 | Premiered: 31 Oct 2018

Radware

Protect your Data in the Cloud
sponsored by Dell EMC and Intel®
VIDEO: Learn about Dell EMC's Integrated Data Protection Appliance, a cloud enabled protection storage product that protects physical and virtual workloads.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

Dell EMC and Intel®

How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

AlienVault

Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO: Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

A New SIEM for a New World
sponsored by Empow Cyber Security
VIDEO: Don't get overwhelmed by the onrush of cybersecurity data – protect your organization by leveraging a modern SIEM that uses AI-powered analytics and automation to process that large volume of data and turn it to your advantage.
Posted: 31 Oct 2018 | Premiered: 25 Oct 2018

Empow Cyber Security

Beat the Top 3 Security Challenges in Office 365
sponsored by Proofpoint, Inc.
VIDEO: Compromised accounts can be used to launch attacks or access sensitive data in the cloud. This is why organizations are taking security measures to defend your cloud collaboration tools against cybercriminals, especially in Office 365 applications. Download this webcast to learn how you can overcome these security challenges, today.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

How MIT takes on Cybersecurity – A Bloomberg Radio Interview
sponsored by Empow Cyber Security
PODCAST: How does the MIT Media Lab protect its ideas of the future from cybercrime? Find out in this exclusive interview with MIT's Media Lab Director, Michail Bletsas.
Posted: 30 Oct 2018 | Premiered: Oct 30, 2018

Empow Cyber Security

Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem
sponsored by CyberGRX
VIDEO: Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.
Posted: 30 Oct 2018 | Premiered: 30 Oct 2018

CyberGRX

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Helping You Manage Digital Risk
sponsored by RSA
WEBCAST: In this video, find out why digital risk is the greatest risk most organizations now face due to global acceleration of digitization, and how a risk framework can help. 
Posted: 23 Oct 2018 | Premiered: Oct 19, 2018

RSA

How Stitch Fix is Building a High-Performing, DevOps Focused Security Team
sponsored by Signal Sciences
VIDEO: Tune into this webinar where Charles Nwatu, Director of Security at Stitch Fix, discusses the many challenges he faces while building his own high-performing, DevOps focused security team, and how he is overcoming them.
Posted: 22 Oct 2018 | Premiered: 22 Oct 2018

Signal Sciences

Modern Approaches to Security for Practitioners
sponsored by Signal Sciences
VIDEO: Tune into Modern Approaches to Security for Practitioners for a look at how security has changed in the DevOps-era, security predictions for the rest of 2018, and more.
Posted: 17 Oct 2018 | Premiered: 13 Dec 2017

Signal Sciences

Adopting a Zero Trust Model: Google Did It, Can You?
sponsored by Zscaler
WEBCAST: In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric approach to application access.
Posted: 09 Oct 2018 | Premiered: Apr 27, 2018

Zscaler

Creating Engaging Privacy Awareness Training for Millennials Webinar
sponsored by MediaPRO
VIDEO: How do you convince your employees in the millennial generation the importance of privacy when they've grown up with sharing on social media? Watch this on-demand webinar, Creating Engaging Privacy Awareness Training for Millennials to find out.
Posted: 01 Oct 2018 | Premiered: 27 Jan 2017

MediaPRO

Keeping Your Network Safe by Managing The Risk Of Targeted Attacks
sponsored by Illusive Networks
WEBCAST: Cyber attackers often target endpoints and then move laterally through the network. Learn about 2 common types of cyber-attacks and how expert Ivan Foreman recommends eliminating those threats in this webcast.
Posted: 13 Sep 2018 | Premiered: Sep 13, 2018

Illusive Networks

Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
sponsored by Arctic Wolf
WEBCAST: Watch this upcoming webinar to learn the essential components needed to defend your business against the top 5 attack vectors we see in a Cyber Security Operations Center (SOC).
Posted: 12 Sep 2018 | Premiered: Sep 12, 2018

Arctic Wolf

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018

IBM

Cloud Security Foundations
sponsored by Forcepoint
VIDEO: In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.
Posted: 17 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
VIDEO: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 17 Sep 2018 | Premiered: 31 Aug 2018

Forcepoint
1 - 25 of 270 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement